NoScript Security Suite — Giorgio Maone
The best security you can get in a web browser! Allow potentially malicious web content to run only from sites you trust. Protect yourself against XSS other web security exploits.
Metapodatki o razširitvi
Posnetki zaslona
O tej razširitvi
Winner of the "PC World - World Class Award" and bundled with the Tor Browser, NoScript gives you the best available protection on the web. It allows JavaScript, Flash, and other executable content to run only from trusted domains of your choice (e.g. your banking site), thus mitigating remotely exploitable vulnerabilities, such as Spectre and Meltdown.
It protects your "trust boundaries" against cross-site scripting attacks (XSS), cross-zone DNS rebinding / CSRF attacks (router hacking), and Clickjacking attempts, thanks to its unique ClearClick technology.
Such a preemptive approach prevents exploitation of security vulnerabilities (known and unknown!) with no loss of functionality where you need it. Experts do agree: Firefox is really safer with NoScript ;-)
FAQ: https://noscript.net/faq
Forum: https://noscript.net/forum
A Basic NoScript 10 Guide
Still confused by NoScript 10's new UI?
Check this user-contributed NoScript 10 primer.
and this NoScript 10 "Quantum" vs NoScript 5 "Classic" (or "Legacy") comparison.
It protects your "trust boundaries" against cross-site scripting attacks (XSS), cross-zone DNS rebinding / CSRF attacks (router hacking), and Clickjacking attempts, thanks to its unique ClearClick technology.
Such a preemptive approach prevents exploitation of security vulnerabilities (known and unknown!) with no loss of functionality where you need it. Experts do agree: Firefox is really safer with NoScript ;-)
FAQ: https://noscript.net/faq
Forum: https://noscript.net/forum
A Basic NoScript 10 Guide
Still confused by NoScript 10's new UI?
Check this user-contributed NoScript 10 primer.
and this NoScript 10 "Quantum" vs NoScript 5 "Classic" (or "Legacy") comparison.
Komentarji razvijalca
Security issues affecting Firefox or the Tor Browser which can be fixed by a NoScript update are guaranteed to be addressed within 24 hours. This sometimes requires many updates to be issued in a short timespan, and when this happens you may notice NoScript UI's asking to "reload this page in order to operate properly". This is normal on "live" updates, and it just means the UI is out of sync with the page content, but there's no need to worry as all the restrictions to scripts and active content are still in place.
Ocenite svojo izkušnjo
Prijavi ta dodatek kot zlorabo
Če sumite, da ta dodatek krši Mozilline pravilnike za dodatke ali da ima težave z zasebnostjo ali varnostjo, prijavite te težave Mozilli prek tega obrazca.
Ne uporabljajte tega obrazca za poročanje o napakah ali zahtevanje novih funkcij; poročilo bo poslano Mozilli in ne razvijalcu dodatka.
Podprite tega razvijalca
Razvijalec te razširitve vas vabi, da podprete nadaljnji razvoj s skromnim prispevkom.
DovoljenjaVeč o tem
Ta dodatek lahko:
- dostopa do zavihkov brskalnika
- shranjuje neomejeno količino podatkov odjemalca
- dostopa do dejavnosti brskalnika med brskanjem
- dostopa do vaših podatkov za vse spletne strani
Več informacij
- Povezave dodatka
- Različica
- 11.4.27
- Velikost
- 927,84 KB
- Zadnja posodobitev
- pred 13 dnevi (8. sep. 2023)
- Sorodne kategorije
- Licenca
- GNU General Public License v2.0
- Pravilnik o zasebnosti
- Preberite pravilnik o zasebnosti za ta dodatek
- Zgodovina različic
- Oznake
Dodaj v zbirko
Opombe ob izdaji 11.4.27
v 11.4.27
============================================================
x [XSS] Better specificity of HTML elements preliminary
checks
x [XSS] Better specificity of potential fragmented injection
through framework syntax detection (thanks Rom623, barbaz
et al)
x [nscl] RegExp.combo(): RegExp creation by combination for
better readability and comments
x [nscl] Replaced lib/sha256.js with web platform native
implementation (thanks Martin for suggested patch)
x [nscl] Fixed property/function mismatch (thanks Alex)
x Fixed operators precedence issue #312 (thanks Alex)
x [nscl] Prevent dead object access on BF cache (thanks
jamhubub and mriehm)
============================================================
x [XSS] Better specificity of HTML elements preliminary
checks
x [XSS] Better specificity of potential fragmented injection
through framework syntax detection (thanks Rom623, barbaz
et al)
x [nscl] RegExp.combo(): RegExp creation by combination for
better readability and comments
x [nscl] Replaced lib/sha256.js with web platform native
implementation (thanks Martin for suggested patch)
x [nscl] Fixed property/function mismatch (thanks Alex)
x Fixed operators precedence issue #312 (thanks Alex)
x [nscl] Prevent dead object access on BF cache (thanks
jamhubub and mriehm)
Več razširitev razvijalca Giorgio Maone
- Še ni ocenjeno
- Še ni ocenjeno
- Še ni ocenjeno
- Še ni ocenjeno
- Še ni ocenjeno
- Še ni ocenjeno